Journal entry 5
Entertainment (rank 6) – Since it appears more probable in my mind that an individual would want to benefit financially from a cyberattack. Gaining more experience would be the primary activity individuals would engage in for fulfillment.
Political (rank 5) – In my opinion, it is the most specialized motive of all. Although a political motivation can exist outside of government agency politics as a whole, I believe that most people who act with a political motivation are not your typical citizens. In my opinion, more seasoned hackers are the ones who take actions motivated by political agendas.
Revenge (rank 4) – Any individual has experienced some sort of misconduct. This could be an infraction of little consequence or something much more serious. A sense of retribution or deed of revenge is what it’s known for. Following up on that, people tend to make decisions more on sentiments than on rational thought.
Boredom (rank 7) – This one makes very little logical sense among the various other motivations on this list of reasons. Despite the fact that an individual engaging in a criminal act for the reason they have grown disinterested, I believe this is not the most probable scenario among the examples on this list of possibilities.
Recognition (rank 2) – Any individual aspires to have themselves reestablished for a particular skill or field of expertise. Consequently, a lot of hackers connect with networks in order to establish an impression or receive recognition for what they have accomplished. In general, a lot of hackers are okay with using a fake identity but want to keep themselves hidden especially when it comes to confidential data.
For Money (rank 3) – Any individual aspires to greater wealth. For the sake of earning a greater sum of money, it drives people to participate in numerous offenses or venture to great lengths.
Multiple reasons (rank 1) – A particular individual is a greater probability to behave out of several motivations instead of just a suitable one. Money could serve as the driving force behind a certain individual, nonetheless they might additionally harbor a secret desire for acknowledgment. Furthermore, they ought to consider it amusing to exact retribution upon an individual.
Journal entry 6
False websites frequently don’t use the entirety of the screen or enhance the webpage in an effort to grab the viewer’s curiosity. They often have a lot of advertisements that reduce user productivity and can look like email newsletters. These websites don’t have an accurate screen layout and frequently resemble newsletters, which makes it challenging for users to deal with properly.
The websites I visited disseminated false information while trying to pass it off as authentic by enticing visitors to provide or acknowledge up for a particular thing.
Fake website 1: http://www.thedogisland.com/
Fake website 2: https://zapatopi.net/treeoctopus/
Fake website 3: http://www.dhmo.org/
Journal entry 7
Meme #1 – “Free public Wi-fi, YES!”
https://unsplash.com/photos/ICTKcvnXx_8
The social connection to the system structure highlights how crucial it is to inform people about the dangers of doing certain things, especially while utilizing public Wi-Fi networks. Making sure that network-connected gadgets are inaccessible to other network users emphasizes the necessity of human system integration in order to shield prospective employees from malevolent attackers on the internet.
Meme #2 – “When dogs have no clue about internet”
https://unsplash.com/photos/gySMaocSdqs
Although anybody may use the internet safely, kids and teenagers are especially at risk. Social media posts that may come back to bother them later in life and cyber predators are only two examples of the serious consequences that can arise from online threats. By unintentionally installing malware that might provide hackers access to private data, children run the risk of exposing their families to online hazards. Awareness, knowledge of potential risks, and open communication with parents are all necessary for protecting children online. Certain dangers can be mitigated with the use of cyber security software.
Meme #3 – “Content for the unknown viewer”
https://commons.wikimedia.org/wiki/File:CellPhone_(16491636068).jpg
Although social media can be a lucrative source of income, one must exercise caution when using it. Steer clear of using your real name or providing any means by which others could obtain your information. Even if something is private, don’t share personal images or videos or personal information. Don’t share private information on social media, such as your birthdate or city, and keep your personal accounts private. Even though the replies you get might not be as bad as you first imagined, exercise caution.
Journal entry 8
The skills of hackers are frequently distorted in movies, emphasizing their quickness and aptitude for breaking into things or deciphering code. They fabricate objects that aren’t real to create the illusion that hackers are that powerful. It appears that competent hackers can easily access anything they want, which promotes the idea that no one is truly secure online. This distorts the perception that no one is truly safe or secure online.
Journal entry 9
On the social media disorder scale, I answered “yes” to six out of nine questions. I believe that some of the scale’s questions are rather general, which, depending on whether it pertains to you, may cause some misunderstandings. In my opinion, the domains that the scale aims to investigate are useful in identifying whether an individual is suffering from a disorder. Access to the internet is the reason for the variations in patterns observed globally. Demonstrating further how access levels and phone ownership can be determined by societal norms. Younger children in the United States have access to social media and phones, while children in many other nations do not enjoy this luxury.
Journal entry 10
The significance of social cybersecurity has grown over the last ten years as a result of technology turning conventional kinetic conflicts into cyberwars. This shift has made information more widely available and increased access to a wider range of sources feasible. Due to the ability of adversaries to spread false information and transgress moral standards, social cyber security must be respected nationally. One way to win a war is to socially demolish the opposition city and inspire the people to rebel against the government or ruling class. Social cyber security is essential for preventing oppositions from interacting on a large scale within society.
Journal entry 11
A cybersecurity analyst may be responsible for a variety of duties and tasks, depending on the particular workplace. Since phishing and other socially engineered attacks on the network were covered in a large portion of the video, it is imperative to the work that one has an understanding of other people’s social behaviors. Not to mention, hackers constantly look for gaps and vulnerabilities when targeting computers and networks. Each organization has its own uniqueness because of the individual members. In the video, the role was also mentioned in addition to training and education. Becoming acquainted with people is crucial to preserving network security because these are social exchanges.
Journal entry 12
The Laissez-fare economics theory is one economic theory that is relevant to this letter. According to this theory, governments shouldn’t become involved in the economy unless it’s necessary to safeguard citizens. In this instance, the government is getting engaged to safeguard the users whose information might have been stolen. The Cost/Benefit Analysis is a second economics theory that is relevant to this correspondence. This is done to calculate the benefits and costs of informing the users that a compromise was made. This study is also carried out to ascertain which decisions are best for an individual or a company. One social science theory that is utilized to decide what to do in a given situation is the rational choice theory. To ascertain which decisions would yield the optimal result in the long run. The individual getting the information also applies this idea to decide how best to react or behave, aware that their information is in danger. Additionally relevant to this letter is the deterrence theory. It seems worthwhile to the entity that committed the crime to carry it out. Concluding that the penalties for being discovered are insufficiently severe. The individual is not deterred as a result. If someone is found to have committed a crime, the government should ultimately impose tougher laws or sentences. Given that people wouldn’t want to face such a sentence, there would be less criminal activity as a consequence.
Journal entry 13
It should come as no surprise that bug bounties are a useful tool for implementing better secure network policies. All things considered, a business will typically experience a cyber breach or hacking at some point. Cybersecurity is typically a field that is developed in response to an event. One way that the field of cybersecurity has been able to stay ahead of the curve in terms of bug bounty setup. Both the business and the hackers profit from bug bounties. A bug bounty program not only informs a corporation about its cybersecurity vulnerabilities but also gives hackers a means of earning money or recognition.
Journal entry 14
Andriy Slynchuk discusses 11 criminal activities by internet users. In my perspective, the five most important infractions are 11, 9, 8, 7, and 5 from the image. unlawful internet searches are significant because the items that are unlawful to seek on the internet are so for a reason. It is possible to be concerned if someone is attempting to look up such stuff. Another significant infraction is gathering information about youngsters. Gather information about children under the age of 13 in accordance with the Children’s Protection Act. Moreover, children may be exposed to things that they shouldn’t be, which makes this detrimental. Utilizing the intent networks of others is a significant concern as well, since it can trace back to your internet network if someone uses your private network to look for or investigate unlawful content online. The individual whose internet network is being used has cause for concern over this. Online identity theft is a problem as well because, if the information used is someone else’s, it may be categorized as identity fraud. If it believes the user is older, there may also be a problem with the content that is displayed to them. Because it can have consequences in real life, cyberbullying and trolling are serious problems. Cyberbullying can result in self-harm or adverse consequences for the victim.
Journal entry 15
My curiosity was sparked by Davin Teo’s TED talk on digital forensics, since these investigators use electronic gadgets, data analysis, and digital evidence tools to solve crimes, necessitating a thorough comprehension of behavioral, social, and psychological factors. Davin Teo talks about his path into digital forensics, which began with his career as an accountant and eventually led him to computer science. He analyzes data in secret cases like bank accounts and threats to the IT department using his knowledge of human behavior and social science competence. Teo stresses the value of maintaining a low profile in one’s professional life and the influence of research and social structure knowledge. By showcasing the possibilities for passion in atypical sectors, Mr. Teo’s journey in the field of digital forensics highlights the significance of technical capabilities and social science understanding for a successful career.